Optimising your experience...
logo oxits homepage
The Internet of Things, prime hacking targets.

Not cyber myths; hacking nuclear plants, oil rigs, pipelines, water plants, industrial facilities
and power grids are not myths born in the cyber-mist, but realities.

What we do?

IoT security end-to-end

OXITS and its partners already protects more than a half billion IoT devices, putting OXITS among the biggest providers of IoT security today and first to deliver a comprehensive security reference architecture for how to build-in security to make your IoT systems "secure by design."

IoT security is a complex problem requiring both breadth and depth of security experience. OXITS brings an unrivalled breadth of world leading security solutions for device protection, encryption, authentication, key management and code signing.

OXITS has unmatched depth in security expertise from monitoring, analysing and processing more than 10 trillion security events per year worldwide.

Authenticating device communications, protecting code, applications and securing devices from threats.

We are also building on our existing IoT offerings to provide security analytics and an IoT platform in the future. These solutions give organisations a powerful way to detect anomalies, manage and update devices remotely even in resource-limited environments.

Platform Integrity Verification

Platform integrity verification allows a remote party to verify the health status of a platform. The requester can then use this information to decide whether to grant access to confidential information, for instance. This functionality enhances system security by complementing user and device authentication with an additional platform health check.

Authentication

Migrating from unsecure usernames and passwords to cryptographic mechanisms as a more robust way of securing communication over the IoT. Particularly for embedded systems, where security demands are rising to protect against counterfeiting, firmware tampering and illegal access, strong cryptography is the only way to fulfill today’s needs.

Secured Communication

In a typical IoT architecture, devices and systems are connected across heterogeneous networks employing various standard and proprietary protocols. These networks expose systems to various risks such as eavesdropping on messages and message falsification. We protect against these threats by providing secure communication capabilities.

Data Encryption and Integrity

Devices connected to the IoT often store sensitive user data locally. Typical examples include contacts, travel preferences and favourite playlists. Many users have concerns that this data could be accessed or manipulated over the IoT. These data privacy fears can be alleviated by encrypting the data and thus protecting its integrity and confidentiality.

Crypto Offloads

IoT device designers may wish to offload some or all cryptographic operations to a secured microcontroller for a number of reasons. The most common driver is a desire to keep some or all crypto keys and operations in a secure environment. The move could also be prompted by a need to increase performance and reduce the load on the main processor.

Lifecycle Management

Information networks are getting bigger, more powerful, distributed and heterogeneous. These trends are adding layers of complexity and diversity to the underlying ICT supply chains. Steps in the lifecycle management process include design, development, manufacturing, provisioning, third-party installation, device firmware updates and device recalls/retirement.

About us

Unparalleled protection

Complete IoT security services; comprehensive visibility into the location and movement of each IoT device – helping protect physical and human assets.

Unrivalled breadth of world leading security solutions for device protection, encryption, authentication, key management, and code signing with unmatched depth in security expertise from monitoring, analysing and processing more than 10 trillion security events per year worldwide.

A world where everyone can create, exchange, and consume data on any device, connected to any network, using any application, with fully assured privacy and security. OXITS is backed by WT VOX, and by the Venture Capital Unit of S.KNOX

Partner of choice for IoT Security

Most security professional still focus on IT and Information Security but devices and services used in IoT are moving out to the edge.